Security Basics mailing list archives
Re: Wireless Security
From: Kevin Reiter <tux () penguinnetwerx net>
Date: Mon, 17 Oct 2005 15:54:22 -0400
Herman Frederick Ebeling, Jr. wrote: <large snip>
====> I would have to think that one should/would be able to go in to various computers that are illegally hooked to their network in order to determine the identity of those who are using his/her network illegally.
Wrong. Even if they're not authorized to be on your network, that doesn't automagically give you permission to invade their system. Scanning packets and doing non-invasive queries is OK, but anything other than passive scanning/listening would also be illegal on your (the network owner's) part. Your best bet at that time would be to block their MAC, or take other actions on your side that would deny them access to _your_ network.
<snip> -Kev
Current thread:
- Wireless Security Herman Frederick Ebeling, Jr. (Oct 12)
- Re: Wireless Security Kenton Smith (Oct 13)
- Re: Wireless Security Kevin Reiter (Oct 13)
- RE: Wireless Security Herman Frederick Ebeling, Jr. (Oct 14)
- Re: Wireless Security Kevin Reiter (Oct 18)
- RE: Wireless Security Herman Frederick Ebeling, Jr. (Oct 14)
- RE: Wireless Security David Gillett (Oct 13)
- RE: Wireless Security Herman Frederick Ebeling, Jr. (Oct 13)
- RE: Wireless Security David Gillett (Oct 14)
- RE: Wireless Security Herman Frederick Ebeling, Jr. (Oct 14)
- RE: Wireless Security David Gillett (Oct 17)
- RE: Wireless Security Herman Frederick Ebeling, Jr. (Oct 17)
- Hard drives v. CF/Smart media/etc. Herman Frederick Ebeling, Jr. (Oct 18)
- RE: Hard drives v. CF/Smart media/etc. David Gillett (Oct 18)
- Re: Hard drives v. CF/Smart media/etc. Robert Reed (Oct 18)
- Re: Hard drives v. CF/Smart media/etc. Alloishus BeauMains (Oct 18)
- RE: Wireless Security Herman Frederick Ebeling, Jr. (Oct 13)